COMPARE PERFORMANCE DATA OF CRITICAL ASSETS AND SYSTEMS WITH SOFTWARE MONITORING DATA TO DETECT THREATS AND ANOMALIES AND CALL USERS TO ACTION.

“Zero day” attacks pose a real and constant threat to industrial control systems as they are designed to remain dormant (and therefore undetectable) until the moment their malicious code is activated. Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards – threats, attack, natural disasters, etc. Our Cyber VUE team deploys a cyber-physical resilient security system, a real-time, continuous monitoring system to detect and report inconsistencies and counter threats of these hazards. Unlike other cyber-physical systems that seek to “sniff and detect” rogue IT procedures, Cyber VUE operates outside of the control system’s network, utilizing electrical sensing components that cannot be spoofed. Compare performance data of critical assets and systems with software monitoring data to detect threats and anomalies and call users to action.

Anomaly Detection

Anomaly Detection will expose threats and attacks on the grid before facilities are affected.

Continuity of Operations

Continuity of Operations plans will be implemented depending on various levels of threat, attack, or natural disaster.

Cyber Threat Mitigation

Threat Mitigation will help maintain secure function of critical infrastructure.

Intelligent Islanding

Islanding allows you to run your facility off the grid, on it’s own until the grid is restored.